Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 23:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe
-
Size
384KB
-
MD5
32030274d88d210bb75c344c851e774c
-
SHA1
ebc1946fa46cf5923cf14fb4ca25603c80243813
-
SHA256
05ff078cb8b7b75d555c9883099cc27e1ea93e4caba6ae59bbfe762d16aa5d8d
-
SHA512
314c19affe2d51a2395088ec0325e09a797d44ae774f93cad6c828cd22678edcef42bd40e4910db37963fb1b9e235a2444c27401e408f73c3db5e4a54ec54ed9
-
SSDEEP
12288:3plrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:ZxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2016 Employ.exe -
Loads dropped DLL 2 IoCs
pid Process 2200 2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe 2200 2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\obtained\Employ.exe 2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2200 2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe 2200 2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe 2200 2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe 2200 2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe 2016 Employ.exe 2016 Employ.exe 2016 Employ.exe 2016 Employ.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2016 2200 2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe 28 PID 2200 wrote to memory of 2016 2200 2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe 28 PID 2200 wrote to memory of 2016 2200 2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe 28 PID 2200 wrote to memory of 2016 2200 2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_32030274d88d210bb75c344c851e774c_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files\obtained\Employ.exe"C:\Program Files\obtained\Employ.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5ba597960be43fbca5b8f2ba0f8ecdb5f
SHA1081946e64d32d6fdd75aeaa42c9037f8e663823e
SHA256780ebc84ba1f9ae0f3c4291aaaf838b7b5f8ec5c2b0e3c0dc5098519b32bd508
SHA5120b4ff5202174727f6ac081a7366642d129e734a791f6d0472aa7fa4ee15fbfa7cb788c892037acebdb96fe992821308fa9b69be07018c751fe60b3ff83a9ce52